diff --git a/README.md b/README.md index ea843ba..8f86197 100644 --- a/README.md +++ b/README.md @@ -72,6 +72,29 @@ on this. Up to the curious reader to develop this further. The utility `cab_parser.py` can be used to see the headers of the exploit file, but don't consider this a full parser. It's a very quick and dirty CAB header viewer I developed to understand what was going on. +# Install + +The generator is designed to work on Windows, as it uses the `makecab` utility. Before usage, be sure to install required dependencies: + +* With Virtualenv + +``` +git clone https://github.com/klezVirus/CVE-2021-40444 +cd CVE-2021-40444 +pip install virtualenv +python -m virtualenv venv +venv\Scripts\activate.bat +pip install -r requirements +``` + +* Without Virtualenv + +``` +git clone https://github.com/klezVirus/CVE-2021-40444 +cd CVE-2021-40444 +pip install -r requirements +``` + # Usage The generator is trivial to use, and has been tested with a number of different DLL payloads.